By using this site, you agree to the Privacy Policy and Terms of Use.
Accept

BusinessLine Digital

  • Business
    • Branding
    • Cryptocurrency
    • Investment
    • Marketing
    • Startup
  • Technology
    • Electronics
    • Innovation
    • Smartphone
    • Software
  • Travel
    • Beautiful
    • Destinations
  • More
    • Business NEWS
    • Entertainment
    • Fashion
    • Finance
  • Legal Docs
    • Privacy Policy
    • About us
    • Disclaimer
    • Contact us
Reading: Google Pixel ‘aCropalypse’ exploit reverses edited parts of screenshots
Share
Sign In
Notification Show More
Latest News
Ways HR Is Thinking About Attracting And Retaining Gen Z Talent
March 19, 2023
DefiLlama forked as internal dispute unfolds
March 19, 2023
Games that shaped the industry
March 19, 2023
Jason Sudeikis With Son Otis At Knicks Game: Photos – Hollywood Life
March 19, 2023
Hubble stuns with new glittering star cluster image
March 19, 2023
Aa

BusinessLine Digital

Aa
  • Business
  • Politics
  • Travel
  • Entertainment
  • Science
  • Technology
  • Fashion
Search
  • Business
  • Branding
  • Cryptocurrency
  • Investment
  • Marketing
  • Startup
  • Business NEWS
  • Entertainment
  • Fashion
  • Finance
  • Science
  • Technology
  • Electronics
  • Innovation
  • Smartphone
  • Software
  • Travel
  • Beautiful
  • Destinations
  • Discover
Have an existing account? Sign In
Follow US
  • Advertise
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
BusinessLine Digital > Blog > Technology > Google Pixel ‘aCropalypse’ exploit reverses edited parts of screenshots
Technology

Google Pixel ‘aCropalypse’ exploit reverses edited parts of screenshots

BusinessLine.Digital
BusinessLine.Digital
Last updated: 2023/03/19 at 4:50 PM
Share
5 Min Read
SHARE


A security flaw affecting the Google Pixel’s default screenshot editing utility, Markup, allows images to become partially “unedited,” potentially revealing the personal information users chose to hide, as spotted earlier by 9to5Google and Android Police. The vulnerability, which was discovered by reverse engineers Simon Aaarons and David Buchanan, has since been patched by Google but still has widespread implications for the edited screenshots shared prior to the update.

As detailed in a thread Aaarons posted on Twitter, the aptly-named “aCropalypse” flaw makes it possible for someone to partially recover PNG screenshots edited in Markup. That includes scenarios where someone may have used the tool to crop or scribble out their name, address, credit card number, or any other kind of personal information the screenshot may contain. A bad actor could exploit this vulnerability to reverse some of those changes and obtain information users thought they had been hiding.

In a forthcoming FAQ page obtained early by 9to5Google, Aarons and Buchanan explain that this flaw exists because Markup saves the original screenshot in the same file location as the edited one, and never deletes the original version. If the edited version of the screenshot is smaller than the original, “the trailing portion of the original file is left behind, after the new file is supposed to have ended.”

According to Buchanan, this bug first emerged about five years ago, around the same time Google introduced Markup with the Android 9 Pie update. That’s what makes this all the worse, as years-worth of older screenshots edited with Markup and shared on social media platforms could be vulnerable to the exploit.

The FAQ page states that while certain sites, including Twitter, re-process the images posted on the platforms and strip them of the flaw, others, such as Discord, don’t. Discord only just patched the exploit in a recent January 17th update, which means edited images shared to the platform before that date may be at risk. It’s still not clear whether there are any other affected sites or apps and if so, which ones they are.

The example posted by Aarons (embedded above) shows a cropped image of a credit card posted to Discord, which also has the card number blocked out using the Markup tool’s black pen. Once Aarons downloads the image and exploits the aCropalypse vulnerability, the top part of the image becomes corrupted, but he can still see the pieces that were edited out in Markup, including the credit card number. You can read more about the technical details of the flaw in Buchanan’s blog post.

After Aarons and Buchanan reported the flaw (CVE-2023-21036) to Google in January, the company patched the issue in a March security update for the Pixel 4A, 5A, 7, and 7 Pro with its severity classified as “high.” It’s unclear when this update will arrive for the other devices affected by the vulnerability, and Google didn’t immediately respond to The Verge’s request for more information. If you want to see how the issue works for yourself, you can upload a screenshot edited with a non-updated version of the Markup tool to this demo page created by Aarons and Buchanan. Or, you can check out some of the scary examples posted on the web.

This flaw came to light just days after Google’s security team found that the Samsung Exynos modems included in the Pixel 6, Pixel 7, and select Galaxy S22 and A53 models could allow hackers to “remotely compromise” devices using just a victim’s phone number. Google has since patched the issue in its March update, although this still isn’t available for the Pixel 6, 6 Pro, and 6A devices yet.

Orignal Post From: Google Pixel ‘aCropalypse’ exploit reverses edited parts of screenshots

You Might Also Like

Games that shaped the industry

Hubble stuns with new glittering star cluster image

‘Citizen Sleuth’ review: True crime podcasting finds itself in an unflattering spotlight

The 9 best MagSafe cases for iPhone 14 Pro and iPhone 14 Pro Max

Emerging managers hope the new SVB offers the same support to new VCs

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
[mc4wp_form]
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
BusinessLine.Digital March 19, 2023
Share this Article
Facebook Twitter Copy Link Print
Share
Join Us!

Subscribe to our newsletter and never miss our latest news, podcasts etc..

Loading
Zero spam, Unsubscribe at any time.

Removed from reading list

Undo
Welcome Back!

Sign in to your account

Lost your password?